Sciweavers

4085 search results - page 591 / 817
» Data Services - From Data to Containers
Sort
View
COSIT
2005
Springer
95views GIS» more  COSIT 2005»
15 years 10 months ago
Simulation of Obfuscation and Negotiation for Location Privacy
Abstract. Current mobile computing systems can automatically sense and communicate detailed data about a person’s location. Location privacy is an urgent research issue because c...
Matt Duckham, Lars Kulik
DEXA
2005
Springer
106views Database» more  DEXA 2005»
15 years 10 months ago
Personalized and Community Decision Support in eTourism Intermediaries
The rapidly growing web technologies and electronic commerce applications have stimulated the need of personalized and group decision support functionalities in eTourism intermedia...
Chien-Chih Yu
ERCIMDL
2005
Springer
133views Education» more  ERCIMDL 2005»
15 years 10 months ago
XMLibrary Search: An XML Search Engine Oriented to Digital Libraries
Abstract. The increase in the amount of data available in digital libraries calls for the development of search engines that allow the users to find quickly and effectively what ...
Enrique Sánchez Villamil, Carlos Gonz&aacut...
127
Voted
FOSAD
2005
Springer
15 years 10 months ago
Formal Methods for Smartcard Security
Smartcards are trusted personal devices designed to store and process confidential data, and to act as secure tokens for providing access to applications and services. Smartcards ...
Gilles Barthe, Guillaume Dufay
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
15 years 10 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood